EasyManua.ls Logo

Juniper E320 User Manual

Juniper E320
212 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #186 background imageLoading...
Page #186 background image
JUNOSe 7.2.x Policy Management Configuration Guide
170 ! Configuring RADIUS-Based Mirroring
Example Configuring RADIUS-Initiated Mirroring When a User is Already Logged In
When a mirroring operation is initiated for a user who is already logged in, the
RADIUS server uses change-of-authorization messages and passes the required
RADIUS attributes and the identifier of the currently running session to the E-series
router. The router uses this information to create the secure policy and attaches it to
the interface that is created for the user. The E-series router must be configured to
accept change-of-authorization messages from the RADIUS server.
1. Specify the RADIUS dynamic-request server, and enter RADIUS configuration
mode.
host1(config)#radius dynamic-request server 192.168.11.0
2. Specify the UDP port used to communicate with the RADIUS server.
host1(config-radius)#udp-port 3799
3. Create the key used to communicate with the RADIUS server.
host1(config-radius)#key mysecret
4. Configure the router to receive change-of-authorization messages from the
RADIUS server.
host1(config-radius)#authorization change
host1(config-radius)#exit
host1(config)#exit
5. Verify your RADIUS-initiated mirroring configuration.
host1#show radius dynamic-request servers
RADIUS Request Configuration
----------------------------
Change
Udp Of
IP Address Port Disconnect Authorization Secret
------------- ---- ---------- ------------- ------
10.10.3.4 3799 enabled enabled mysecret
6. Create the analyzer port.
host1(config)#interface fastEthernet 4/0
host1(config-if)#ip analyzer

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Juniper E320 and is the answer not in the manual?

Juniper E320 Specifications

General IconGeneral
Rack Units1U
Operating SystemJUNOS
Product TypeRouter
Routing ProtocolsBGP, OSPF, IS-IS, RIP
Memory4 GB
RedundancyPower supply
Power SupplyAC

Summary

Chapter 2 Creating Policies

Creating Classifier Control Lists

Explains how to create Classifier Control Lists (CLACLs) to define packet flows.

Creating Policy Lists

Details the process of creating policy lists, which contain rules for policy actions.

Creating Classifier Groups and Policy Rules

Describes how to create classifier groups and policy rules within a policy list.

Applying Policy Lists to Interfaces and Profiles

Details how to assign policy lists to interfaces and profiles for traffic management.

Chapter 3 Creating Rate-Limit Profiles

One-Rate Rate-Limit Profiles

Details how to create and configure one-rate rate-limit profiles for TCP applications.

Two-Rate Rate-Limits

Explains how to create two-rate rate-limit profiles for tiered rate-limit services.

Chapter 4 Policy Resources

FPGA Hardware Classifiers

Describes FPGA hardware classifiers used for packet classification with hardware assist.

Chapter 5 Monitoring Policy Management

Policy Management show Commands

Lists and describes the show commands used to display policy statistics and configurations.

Packet Flow Monitoring

Explains how to use the policy log rule to capture and monitor packet flows.

Chapter 6 Packet Mirroring

Overview

Introduces packet mirroring for traffic analysis, debugging, and troubleshooting.

Configuring CLI-Based Packet Mirroring

Explains how to use CLI commands to configure and manage packet mirroring.

Configuring RADIUS-Based Mirroring

Details how to configure RADIUS-based mirroring for specific users and sessions.

Related product manuals